skip to Main Content
Data Breaches & The Dark Web

Data Breaches & The Dark Web

Below is an example of a sextortion email. One of my client's received it this morning. These types of emails (or sometimes letters) are so effective because the criminal provides real information. The bad actors typically purchase personally identifiable information…

Read More
Tech Term Tuesday

Tech Term Tuesday: MFA

Today's Tech Term Tuesday is about something that everyone who uses online services should know about and use. Multi-factor Authentication (a.k.a. Two-factor, 2FA, and MFA) is a critical piece of any IT security plan. https://youtu.be/L9a22keglAk

Read More

The Enemy Within

No doubt there are nefarious actors who might try to breach your network by launching external attacks. However, I would argue that the greatest enemy of your IT security is most likely you or your employees. From not practicing good…

Read More